{"dataType":"CVE_RECORD","cveMetadata":{"cveId":"CVE-2024-35785","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-05-17T12:19:12.338Z","datePublished":"2024-05-17T12:24:28.069Z","dateUpdated":"2026-05-11T20:11:00.747Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T20:11:00.747Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\ntee: optee: Fix kernel panic caused by incorrect error handling\n\nThe error path while failing to register devices on the TEE bus has a\nbug leading to kernel panic as follows:\n\n[   15.398930] Unable to handle kernel paging request at virtual address ffff07ed00626d7c\n[   15.406913] Mem abort info:\n[   15.409722]   ESR = 0x0000000096000005\n[   15.413490]   EC = 0x25: DABT (current EL), IL = 32 bits\n[   15.418814]   SET = 0, FnV = 0\n[   15.421878]   EA = 0, S1PTW = 0\n[   15.425031]   FSC = 0x05: level 1 translation fault\n[   15.429922] Data abort info:\n[   15.432813]   ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000\n[   15.438310]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n[   15.443372]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n[   15.448697] swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000000d9e3e000\n[   15.455413] [ffff07ed00626d7c] pgd=1800000bffdf9003, p4d=1800000bffdf9003, pud=0000000000000000\n[   15.464146] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP\n\nCommit 7269cba53d90 (\"tee: optee: Fix supplicant based device enumeration\")\nlead to the introduction of this bug. So fix it appropriately."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/tee/optee/device.c"],"versions":[{"version":"a953e45ebeae9a5ce342c012f7eb2a92cc8af89b","lessThan":"bc40ded92af55760d12bec8222d4108de725dbe4","status":"affected","versionType":"git"},{"version":"01c13d8a95e0909f0081d6e3e8a891761992371b","lessThan":"4b12ff5edd141926d49c9ace4791adf3a4902fe7","status":"affected","versionType":"git"},{"version":"1c9561b438cbe61e78515fc7b16dc7fb8cf0b763","lessThan":"e5b5948c769aa1ebf962dddfb972f87d8f166f95","status":"affected","versionType":"git"},{"version":"d3c4786b01aad8c377718f92d6d9b15906ee0a2a","lessThan":"520f79c110ff712b391b3d87fcacf03c74bc56ee","status":"affected","versionType":"git"},{"version":"7269cba53d906cf257c139d3b3a53ad272176bca","lessThan":"bfa344afbe472a9be08f78551fa2190c1a07d7d3","status":"affected","versionType":"git"},{"version":"7269cba53d906cf257c139d3b3a53ad272176bca","lessThan":"95915ba4b987cf2b222b0f251280228a1ff977ac","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/tee/optee/device.c"],"versions":[{"version":"6.7","status":"affected"},{"version":"0","lessThan":"6.7","status":"unaffected","versionType":"semver"},{"version":"5.10.215","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.154","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.84","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.24","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.7.12","lessThanOrEqual":"6.7.*","status":"unaffected","versionType":"semver"},{"version":"6.8","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10.204","versionEndExcluding":"5.10.215"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.15.143","versionEndExcluding":"5.15.154"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.1.68","versionEndExcluding":"6.1.84"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.6.7","versionEndExcluding":"6.6.24"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.7","versionEndExcluding":"6.7.12"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.7","versionEndExcluding":"6.8"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/bc40ded92af55760d12bec8222d4108de725dbe4"},{"url":"https://git.kernel.org/stable/c/4b12ff5edd141926d49c9ace4791adf3a4902fe7"},{"url":"https://git.kernel.org/stable/c/e5b5948c769aa1ebf962dddfb972f87d8f166f95"},{"url":"https://git.kernel.org/stable/c/520f79c110ff712b391b3d87fcacf03c74bc56ee"},{"url":"https://git.kernel.org/stable/c/bfa344afbe472a9be08f78551fa2190c1a07d7d3"},{"url":"https://git.kernel.org/stable/c/95915ba4b987cf2b222b0f251280228a1ff977ac"}],"title":"tee: optee: Fix kernel panic caused by incorrect error handling","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T03:21:47.405Z"},"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/bc40ded92af55760d12bec8222d4108de725dbe4","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/4b12ff5edd141926d49c9ace4791adf3a4902fe7","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/e5b5948c769aa1ebf962dddfb972f87d8f166f95","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/520f79c110ff712b391b3d87fcacf03c74bc56ee","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/bfa344afbe472a9be08f78551fa2190c1a07d7d3","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/95915ba4b987cf2b222b0f251280228a1ff977ac","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-35785","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-09-10T15:42:54.358717Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-11T17:33:23.278Z"}}]},"dataVersion":"5.2"}